CVE-2021-4330
🟡 Monitoruj
Luka w wtyczkach Envato Elements i Template Kit – Import umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
9.9%
Exploit
none
Vendor
envato
Opis źródłowy (NVD)
The Envato Elements & Download and Template Kit – Import plugins for WordPress are vulnerable to arbitrary file uploads due to insufficient validation of file type upon extracting uploaded Zip files in the installFreeTemplateKit and uploadTemplateKitZipFile functions. This makes it possible for attackers with contributor-lever permissions and above to upload arbitrary files and potentially gain remote code execution in versions up to and including 1.0.13 of Template Kit – Import and versions up to and including 2.0.10 of Envato Elements & Download.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 9.9% |
| Opublikowano (NVD) | 2023-03-07 14:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:13 UTC |
Referencje
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2617529%40envato-elements&new=2617529%40envato-elements&sfp_email=&sfph_mail= (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/68fe17e2-d5ab-4ebd-a5c6-d65cea327abd?source=cve (security@wordfence.com)
- https://www.wordfence.com/threat-intel/vulnerabilities/id/68fe17e2-d5ab-4ebd-a5c6-d65cea327abd (af854a3a-2127-422b-91ae-364da2661108) [Third Party Advisory]